Analysis
-
max time kernel
146s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 04:40
Static task
static1
Behavioral task
behavioral1
Sample
676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4.exe
Resource
win10v2004-20220414-en
General
-
Target
676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4.exe
-
Size
1.8MB
-
MD5
3b06a29a97cc177e0ead020232757c49
-
SHA1
f866cb89ead83d13ad49573ef4f2671c4caa967d
-
SHA256
676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4
-
SHA512
e4077465f6aeb45c23ba8bc17c076bb03459b1c9266aa9c813b63c6a5b553e349c7fbb38fadec54edd471cbec1f7e7f823ab0dafe759994bf120e0f454f061dd
Malware Config
Extracted
sendsafe
UNREGISTERED
31.44.184.32:50069
31.44.184.32:50070
-
service_name
Enterprise Mailing Service
Signatures
-
SendSafe Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1840-55-0x0000000000400000-0x00000000005D5000-memory.dmp sendsafe behavioral1/memory/1840-56-0x0000000000400000-0x00000000005D5000-memory.dmp sendsafe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4.exepid process 1840 676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4.exepid process 1840 676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4.exe"C:\Users\Admin\AppData\Local\Temp\676f015fb666105fff33ae26909a1b80155eeeacdc6fa6454d6732ebe1400fd4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage